HIPAA 2018 – Understanding Compliance Program Requirements

Being in compliance with HIPAA in 2018 involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies and procedures in place. If audited or the subject of a breach investigation you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards.

Why You Should Attend:

With a new year upon us, is your organization keeping up with the HIPAA requirements mandated by the Code of Federal Regulations? Many organizations still need to fully understand the requirements of a compliance program.

Why? In 2016, there was a trend towards higher settlements payments. There were 7 settlements over $1 million including $5.5 million, $3.9 million, and $2.75 million and 12 overall resolutions settlements. In 2017, there was continued HIPAA enforcement with a number of new settlements announced and the trend will continue.

Roger Severino, the Director of OCR, has said “enforcement is a key aspect of HIPAA” and organizations must embrace a “new posture of preventive security.”

Attendees will leave the course clearly understanding of all the requirements for a comprehensive HIPAA compliance program and what steps need to be taken to mitigate risk. The seminar will include practical exercise to assist in knowing how to develop, review, and amend HIPAA policy and procedure. After completing this course, a Covered Entity or Business Associate will have a clear roadmap for what needs to be place when it comes to all of the HIPAA regulations.

Areas Covered in the Session :

  • Why was HIPAA created?
  • What is HITECH and the Omnibus Rule?
  • Who Must Comply with HIPAA Requirements?
  • What are the HIPAA Security and Privacy Rules?
  • What is a HIPAA Compliance Program?
  • What is a HIPAA Risk Management Plan?
  • What is meant by “Required” and “Addressable” Implementation Specifications?
  • What are Administrative, Technical, and Physical Safeguards Requirements?
  • HIPAA policy and procedure practical exercise
  • What is a HIPAA Risk Assessment?
  • Risk Assessment practical exercise
  • What are HIPAA training requirements?
  • What is a HIPAA data breach and what happens if it occurs?
  • What are the penalties and fines for non-compliance and how to avoid them?
  • Creating a Culture of Compliance
  • Interactive Q&A
Who Should Attend:

  • Compliance Officer
  • HIPAA Privacy Officer
  • HIPAA Security Officer
  • Medical/Dental Office Managers
  • Practice Managers
  • Information Systems Manager
  • Chief Information Officer
  • General Counsel/lawyer
  • Practice Management Consultants
  • Any Business Associates that accesses protected health information
  • IT Companies that support Medical/Dental practices or other healthcare organizations

HC2224

Jay Hodes

Jay Hodes is President of Colington Security Consulting, LLC, which provides HIPAA consulting services for healthcare providers and business associates. Mr. Hodes has over 30 years of combined experience in risk assessments, site security evaluation, regulatory compliance, policy and procedures assessments, and Federal law enforcement management. He is the former Assistant Inspector General for Investigations at the U.S. Department of Health and Human Services.

Mr. Hodes has been the keynote speaker and provided presentations regarding HIPAA compliance to a number of professional healthcare organizations. He has published over 25 educational articles regarding HIPAA compliance, been featured in Part B News articles and provided a guest post in the Electronic Health Reporter.

JUST RELEASED
SEMINARS
&
WORKSHOPS
 



Untitled1


  • Login Information with Password to join the session, 24 hours prior to the webinar
  • Presentation Handout in .pdf format
  • Presentation from the Speaker
  • Feedback form
  • Certificate of Attendance
  • Recording access Information with Password to view the webinar, will be sent 24 hours after the completion of the Live webinar.
  • Presentation Handout in .pdf format
  • Certificate of Attendance
.